# transformer
5 articlestagged with “transformer”
Transformer Architecture for Attackers
Deep dive into the transformer architecture — attention, feed-forward layers, and residual connections — through the lens of which components are exploitable.
transformerattentionarchitectureintermediate
Transformer Architecture Basics for Security
Understanding transformer architecture fundamentals through a security lens: how attention, embeddings, and generation create exploitable properties.
foundationstransformerarchitecturebasics
Attention Pattern Manipulation
Craft inputs that manipulate transformer attention patterns to prioritize adversarial content over safety instructions.
labsattentionmanipulationtransformeradvanced
Transformer Attention Mechanism Attacks
Attacks targeting transformer attention mechanisms including attention hijacking and gradient-based manipulation.
model-deep-divestransformerattentionattacks
Attention Hijacking Attack Walkthrough
Hijack transformer attention mechanisms to redirect model focus toward adversarial instructions in the context.
walkthroughsattentionhijackingtransformer